Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GET / WETH | uniswap_v2 | 0x2680...4107 | 0.364254660902879 |
GET / WETH | sushiswap | 0xbb19...21b2 | 0.362543243902936 |
GET / WETH 1% | uniswap_v3 | 0x0246...4ada | 0.5409778035 |
GET / ETH 1% | uniswap-v4-ethereum | 0x3a2b...4514 | 0.37501643 |
GET / WETH | orion-ethereum | 0xdb4b...74d8 | 0.5135556125 |
GET / UNI 1% | uniswap_v3 | 0x4a7e...a315 | 1.077062752974859619275555433952 |
GET / USDC 1% | uniswap_v3 | 0x0358...464b | 1.39476968144323708408239555338 |
GET / LINK | uniswap_v2 | 0x00e3...b685 | 1.27723456339271 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.